e:\etzzlrn\ef
Static task
static1
Behavioral task
behavioral1
Sample
f64557df768765aae35601a4612b20da_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f64557df768765aae35601a4612b20da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f64557df768765aae35601a4612b20da_JaffaCakes118
-
Size
379KB
-
MD5
f64557df768765aae35601a4612b20da
-
SHA1
739e41ef1b74bb2d69db0f22014222b3fc5b170e
-
SHA256
f14de7a0b5dca3e646a81ca8a7eea0d25656c6f807446949fc33b4505b51c07d
-
SHA512
de754644a4feb86edf338def0b4b9b6bd1e84ca5975b4fdd82db51f01a7107847d0c3bc5ab929ff8e7a3834319d9eaa37dc0dfd4d2e9400a1b039f802828e13a
-
SSDEEP
6144:FNiJlcDg/hbuqWDG5bTr9g9eRwoHJlYgf63CCXrAD58dFlHWg68a6SZao:FNglT/hIq1Tr9UeT0gy3n70CPg8adgo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f64557df768765aae35601a4612b20da_JaffaCakes118
Files
-
f64557df768765aae35601a4612b20da_JaffaCakes118.exe windows:4 windows x86 arch:x86
512322115cbf0a5419b2e162d973c1cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
IncrementUrlCacheHeaderData
InternetReadFileExW
kernel32
Sleep
GetCommandLineA
VirtualFree
WriteConsoleInputW
InitializeCriticalSection
GetEnvironmentStringsW
SetUnhandledExceptionFilter
HeapSize
HeapDestroy
GetModuleFileNameA
DeleteCriticalSection
LoadLibraryA
GetLocaleInfoA
LoadLibraryExW
GetTimeFormatA
CreateMailslotA
GetUserDefaultLCID
HeapFree
GetStartupInfoW
GetCurrentThread
GetCurrentProcess
GetEnvironmentStrings
LCMapStringA
CreateFileA
FreeLibrary
SetStdHandle
GetStringTypeA
WriteFile
GetStdHandle
EnumSystemLocalesA
WriteConsoleA
WideCharToMultiByte
CompareStringA
GetDateFormatA
HeapReAlloc
GetOEMCP
CloseHandle
GetFileType
GetModuleFileNameW
InterlockedExchange
TlsGetValue
GetACP
FileTimeToLocalFileTime
RtlUnwind
SetLastError
lstrcpynW
GetSystemTimeAsFileTime
GetLastError
InterlockedDecrement
InterlockedIncrement
GetProcAddress
MultiByteToWideChar
GetCPInfo
HeapAlloc
GetCurrentThreadId
CreateEventA
TerminateProcess
LeaveCriticalSection
GetTimeZoneInformation
SetHandleCount
VirtualQuery
GetStringTypeW
TlsAlloc
TlsFree
GetStartupInfoA
CompareStringW
IsValidLocale
QueryPerformanceCounter
GetCommandLineW
SetEnvironmentVariableA
TlsSetValue
GetCurrentDirectoryW
CompareFileTime
DebugBreak
ReadFile
GetConsoleMode
IsValidCodePage
HeapCreate
GetProcessHeap
VirtualAlloc
LCMapStringW
FreeEnvironmentStringsA
ExitProcess
GetModuleHandleA
GetLocaleInfoW
GetVersionExA
WriteConsoleW
GetCurrentProcessId
EnterCriticalSection
FreeEnvironmentStringsW
FlushFileBuffers
GetConsoleCP
UnhandledExceptionFilter
GetTickCount
CreateThread
SetConsoleCtrlHandler
GetConsoleOutputCP
SetFilePointer
OpenMutexA
WriteFileEx
IsDebuggerPresent
CreateMutexA
user32
CreateWindowExA
SetClipboardViewer
RegisterClassExA
GetInputState
MessageBoxA
PostThreadMessageA
DestroyIcon
GetMonitorInfoA
RegisterClassA
OpenWindowStationA
GetIconInfo
WINNLSGetEnableStatus
DispatchMessageA
IsCharAlphaA
MapVirtualKeyExA
SetWindowPos
DefWindowProcA
GetMenuItemRect
PackDDElParam
CheckMenuItem
EnumDesktopsW
DestroyWindow
GetWindowTextA
SetDlgItemInt
ShowWindow
RegisterHotKey
comctl32
ImageList_GetFlags
ImageList_GetImageInfo
ImageList_DragShowNolock
DestroyPropertySheetPage
ImageList_DrawIndirect
ImageList_Read
CreateToolbarEx
ImageList_Write
ImageList_LoadImageA
ImageList_EndDrag
DrawStatusTextA
ImageList_Copy
_TrackMouseEvent
ImageList_BeginDrag
ImageList_ReplaceIcon
ImageList_Destroy
InitCommonControlsEx
ImageList_Replace
ImageList_GetIcon
DrawStatusTextW
ImageList_Add
MakeDragList
Sections
.text Size: 213KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ